From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from phobos.denx.de (phobos.denx.de [85.214.62.61]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 217DBC43334 for ; Fri, 8 Jul 2022 09:06:36 +0000 (UTC) Received: from h2850616.stratoserver.net (localhost [IPv6:::1]) by phobos.denx.de (Postfix) with ESMTP id D2BEC8458A; Fri, 8 Jul 2022 11:06:34 +0200 (CEST) Authentication-Results: phobos.denx.de; dmarc=pass (p=none dis=none) header.from=linaro.org Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de Authentication-Results: phobos.denx.de; dkim=pass (2048-bit key; unprotected) header.d=linaro.org header.i=@linaro.org header.b="FCneCDK0"; dkim-atps=neutral Received: by phobos.denx.de (Postfix, from userid 109) id 0B9938458F; Fri, 8 Jul 2022 11:06:33 +0200 (CEST) Received: from mail-wr1-x430.google.com (mail-wr1-x430.google.com [IPv6:2a00:1450:4864:20::430]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits)) (No client certificate requested) by phobos.denx.de (Postfix) with ESMTPS id 5119B842D1 for ; Fri, 8 Jul 2022 11:06:30 +0200 (CEST) Authentication-Results: phobos.denx.de; dmarc=pass (p=none dis=none) header.from=linaro.org Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=ilias.apalodimas@linaro.org Received: by mail-wr1-x430.google.com with SMTP id v16so18198294wrd.13 for ; Fri, 08 Jul 2022 02:06:30 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to; bh=XwWzlVD6831D8M99MS3G3EuwI/tjJSnv341gSDqlca0=; b=FCneCDK0hvziKgumBCcUX7t2nsuwr8LMvcKqU2CXV9ghOwLx62Q4IJmBCO4ZVUI7Gh RpxnHx5IcqOa2uEBr9MV9bvVPi+kuiom14pmbSBZEw8EBA5KnlHeRwY1b1DYkrhmEFqr 9pNaOqim1v4/nLOy2zDOXj/EPbcvWcrtPMVow//JSKpOGKl1j2WlM6oMb1A7ERiNOnwq RnTfMXtFSxMMrZ99Rvm7vAi+TVaSzLsPma6tVApVmGo1u7GujxPIs1uiHODW6vlhzCN0 k9yWQFWA61LLIYrxBHEHbMosA3FfxWk4NVx4PiA/eskaxKn5JG031us2JcLMRrIUorFE JbFA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to; bh=XwWzlVD6831D8M99MS3G3EuwI/tjJSnv341gSDqlca0=; b=QFtzA9t2eF2W+r4qQEc0HLLPPcDyLgFvDT8odHGstpAsZB0SlSL16qjMZJ/usTjKVX rDkxEnWU2KISMnAvSDsao/mxM0ktCFb1j3O5K//VEpxZb1m6XNByD6XszUlHOpjTLHrE 4RWI/KUciTDwXkFYWyTGyWy9uRKSVnGuy9ic7vwqYgvMbYviDpzEnelAXtieAgslcgly xbAMpsuhLEcXYZt8MzdtmctrkGVF+WRDfhHjb2bapjoh7RwSVt26fO4T6SofiiVpr0Iu c93M9nO4JzpROYxsCg3WMxrT9YM5rfj1/blrWqWeFjl+rY+azehjSGSZj1f3LKX/LBwI ekew== X-Gm-Message-State: AJIora+2pfFEOsMWsSNz6dCS7ZFfpEOyjBa6Axs1olrovTHKl+4fEQNj hPwfUJpLVkR8lWCoUxk8OOLW9w== X-Google-Smtp-Source: AGRyM1vJbQCRiCtOtyG4pKCpG83NwOXZXzeIxHeJF3QLCWSPDCTGS6HiReADZ6/ngfBJwIftoCe7Eg== X-Received: by 2002:a5d:59a1:0:b0:21b:c6fd:ecc4 with SMTP id p1-20020a5d59a1000000b0021bc6fdecc4mr2267080wrr.342.1657271189821; Fri, 08 Jul 2022 02:06:29 -0700 (PDT) Received: from hades ([46.103.15.185]) by smtp.gmail.com with ESMTPSA id j2-20020adfff82000000b0021a56cda047sm2706872wrr.60.2022.07.08.02.06.28 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 08 Jul 2022 02:06:29 -0700 (PDT) Date: Fri, 8 Jul 2022 12:06:26 +0300 From: Ilias Apalodimas To: Masahisa Kojima Cc: u-boot@lists.denx.de, Heinrich Schuchardt , Simon Glass , Takahiro Akashi , Francois Ozog , Mark Kettenis Subject: Re: [RFC PATCH 0/3] eficonfig: add UEFI Secure Boot key maintenance interface Message-ID: References: <20220619052022.2694-1-masahisa.kojima@linaro.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20220619052022.2694-1-masahisa.kojima@linaro.org> X-BeenThere: u-boot@lists.denx.de X-Mailman-Version: 2.1.39 Precedence: list List-Id: U-Boot discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: u-boot-bounces@lists.denx.de Sender: "U-Boot" X-Virus-Scanned: clamav-milter 0.103.6 at phobos.denx.de X-Virus-Status: Clean On Sun, Jun 19, 2022 at 02:20:19PM +0900, Masahisa Kojima wrote: > This series adds the UEFI Secure Boot key maintenance interface > to the eficonfig command. > User can enroll and delete the PK, KEK, db and dbx. > > Note that this series is RFC since this series is implemented > on the top of the "enable menu-driven UEFI variable maintenance" > patch series still under review[1]. > > [1]https://lore.kernel.org/u-boot/20220619045607.1669-1-masahisa.kojima@linaro.org/T/#m7fe16b6044fbb2947b49c26051563c7cbb696fb3 > > Source code can be cloned with: > $ git clone https://git.linaro.org/people/masahisa.kojima/u-boot.git -b kojima/kojima/efi_seckey_menu_upstream_v1_0619 Thanks Kojima-san. This is an important step in removing console access for EFI-enabled devices. Regards /Ilias > > Masahisa Kojima (3): > eficonfig: add UEFI Secure Boot Key enrollment interface > eficonfig: add "Show Signature Database" menu entry > eficonfig: add "Delete Key" menu entry > > cmd/Makefile | 3 + > cmd/eficonfig.c | 3 + > cmd/eficonfig_sbkey.c | 701 ++++++++++++++++++++++++++++++++++++++++++ > include/efi_config.h | 3 + > 4 files changed, 710 insertions(+) > create mode 100644 cmd/eficonfig_sbkey.c > > -- > 2.17.1 >